This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Component-based development has become a recognized technique for building large scale distributed applications. Although the maturity of this technique, there appears to be quite...
With the increasing popularity of the World Wide Web, the number of information sources providing access to various types of data has increased considerably. While simple data ret...
Over the last decades, software engineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct resu...
Cyberinfrastructure integrates information and communication technologies to enable high-performance, distributed, and collaborative knowledge discovery, and promises to revolutio...